A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.
From explainable AI to blockchain to building a super-fast processor, Subram Natarajan, CTO of IBM India/South Asia tells us how IBM does what it does best – innovate to stay ahead.
Access to these devices could enable cybercriminals to snoop on private interactions, enact malicious onsite activities, or gain an entry point into cyber systems.
WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk.
Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path.
CSO Online brings to you the comprehensive list of CISO/CSO movements and new appointments in the cybersecurity space.
From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. And it is here to stay.
Businesses today are facing extremely expensive glitches owing to accumulated technical debt across global IT systems, says Dr. Bill Curtis, Chief Scientist at Cast Software and Director of the Consortium for IT Software Quality (CISQ).